Determination of a payment method used in an NFC transaction

Information

  • Patent Grant
  • 11797963
  • Patent Number
    11,797,963
  • Date Filed
    Thursday, October 29, 2020
    3 years ago
  • Date Issued
    Tuesday, October 24, 2023
    6 months ago
  • Inventors
  • Original Assignees
    • (Berkeley, CA, US)
  • Examiners
    • Goyea; Olusegun
Abstract
A method and system for receiving digital artifacts from a management server. The method includes sending a request for a digital artifact from a mobile application to the management server for display within a specific mobile application generated screen, receiving the digital artifact from the management server, and displaying the digital artifact with the specific mobile application generated screen.
Description
FIELD OF INVENTION

The present invention relates to data communications and wireless devices.


BACKGROUND OF THE INVENTION

Mobile communication devices—e.g., cellular phones, personal digital assistants, and the like are increasingly being used to conduct payment transactions as described in U.S. patent application Ser. No. 11/933,351, entitled “Method and System For Scheduling A Banking Transaction Through A Mobile Communication Device”, and U.S. patent application Ser. No. 11/467,441, entitled “Method and Apparatus For Completing A Transaction Using A Wireless Mobile Communication Channel and Another Communication Channel, both of which are incorporated herein by reference. Such payment transactions can include, for example, purchasing goods and/or services, bill payments, and transferring funds between bank accounts.


BRIEF SUMMARY OF THE INVENTION

In general, this specification describes a method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.


Particular implementations can include one or more of the following features. The point of sale device can be a desktop computer, a laptop computer, or a terminal. The mobile communication device can be a cellular phone, a wireless personal digital assistant (PDA), or a laptop computer. The cellular phone can be an NFC-enabled phone. Sending payment authorization for the total purchase amount from the point of sale device to a payment entity can include sending the payment authorization securely to the payment entity. The payment entity can be a person, a computer system, or a bank. The method can further include maintaining a shopping list on the mobile communication device of the user, in which the shopping list includes a listing of one or more items to be purchased by the user. The payment authorization can be an authorization for payment with a credit card, a debit card, or a prepaid card.


The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a block diagram of a communication system including a wireless mobile communication device and a management server in accordance with one implementation.



FIG. 2 illustrates one implementation of the wireless mobile communication device of FIG. 1.



FIG. 3 is a method for conducting a payment transaction using a point of sale device in accordance with one implementation.



FIG. 4 illustrates a block diagram of a communication system including a wireless mobile communication device and an online store in accordance with one implementation.



FIG. 5 is a block diagram of a data processing system suitable for storing and/or executing program code in accordance with one implementation.





Like reference symbols in the various drawings indicate like elements.


DETAILED DESCRIPTION OF THE INVENTION


FIG. 1 illustrates one implementation of a communication system 100. The communication system 100 includes a hand-held, wireless mobile communication device 102 a point-of-sale device 104 and a management server 106. In one implementation, the mobile communication device 102 includes a mobile application (discussed in greater detail below) that permits a user of the mobile communication device 102 to conduct payment transactions. Payment transactions can include, for example, using contactless payment technology at a retail merchant point of sale (e.g., through point of sale device 104), using mobile/internet commerce (e.g., purchase tickets and products, etc.), storage of payment information and other digital artifacts (e.g., receipts, tickets, coupons, etc.), storage of banking information (payment account numbers, security codes, PIN's, etc.), and accessing banking service (account balance, payment history, bill pay, fund transfer, etc.), and so on. The mobile communication device 102 can be a cellular phone, a wireless personal digital assistant (PDA), a laptop computer, or other wireless communication device. The point of sale device 104 can be a desktop computer, laptop computer, terminal, or other device that is configured to receive user input selecting items for purchase or other transaction.


In one implementation, authorizations for payment transactions that are made through the point of sale device 104 are sent from the point of sale device 104 to an issuer authorization (e.g., management server 106) through the mobile communication device 102 (as shown in FIG. 1). In one implementation, an issuer authorization is a payment entity that either approves or disapproves a payment transaction. An issuer authorization can be, e.g., a person, computer system, bank (or other third party). One potential benefit of having payment authorizations flow through the mobile communication device 102 is that sensitive user information (e.g. account numbers, pin numbers, and/or identity information) need only be sent from the mobile communication device 102 directly to an issuer authorization. Such operation reduces the potential for identity theft and/or fraudulent purchases made through a point of sale device. For example, (in one implementation) payment authorizations cannot be sent to an issuer authorization if the mobile communication device 102 is turned off.



FIG. 2 illustrates one implementation of the mobile communication device 102. The mobile communication device 102 includes a mobile application 200 that (in one implementation) is provided to the mobile communication device 102 through a remote server (e.g., management server 106). In one implementation, the mobile application is a Mobile Wallet application available from Mobile Candy Dish, Inc., of Alameda, CA. In one implementation, the mobile application is a hosted service, as described in U.S. patent application Ser. No. 11/939,821, entitled “Method and System For Securing Transactions Made Through a Mobile Communication Device”, which is incorporated herein by reference. In one implementation, the mobile application 200 is configured to send requests to the management server for artifacts based on user input, e.g., received though a keypad (not shown) of the mobile communication device 102. Requests to the management server 106 can also be automated, via proximity-based services, e.g., consumer tapping (or in close proximity) an LBS/contactless/RFID enabled phone against a smart poster (RFID/Bluetooth/LBS enabled, etc.), kiosk, or other device.


In one implementation, the mobile application 200 running on the mobile communication device 102 is configured to receive artifacts (e.g., advertisements, receipts, tickets, coupons, media, content, and so on) from the management server 106. In one implementation, the management server 106 sends artifacts to the mobile application based on user profile information and/or a transaction history (or payment trends) associated with a user of the mobile communication device 102 as described in U.S. patent application Ser. No. 11/944,267, entitled “Method and System For Delivering information To a Mobile Communication Device Based On Consumer Transactions”, which is incorporated herein by reference.


In one implementation, the mobile communication device 102 is an NFC-enabled phone. The mobile communication device 102 can be NFC-enabled, for example, through an embedded chip or a sticker that is affixed to the cellular phone, as described in U.S. application Ser. No. 11/933,321, entitled “Method and System For Adapting a Wireless Mobile Communication Device For Wireless Transactions”, which is incorporated herein by reference. In one implementation, the NFC chip (or sticker) on the cellular phone can be used in conjunction with a merchant's point of sale device as described in greater detail below.


For example, with reference to FIG. 4, in one implementation, the NFC chip (or sticker) on the cellular phone can communicate with NFC chips that are installed on the front of PC's (TV's, Kiosks, or any other device) and serve as scanners/readers. In this implementation a mobile candy dish applet (e.g., MCD POS plugin 414) is installed on the consumer's computer (e.g., PC 404) which interfaces with the NFC chip on the PC. When a consumer (or user) is shopping online and they are ready to pay for their products, the consumer opens his mobile wallet and selects one of the payment methods (e.g., credit card, debit card, prepaid card, etc.) from their mobile wallet. If a default card has been selected already, this step is not necessary. The consumer then waves their phone over the NFC reader present on the PC 404. The consumer's payment credentials are transferred from the phone to the merchant website (e.g., online store application 410) using a communication protocol between the chip in the phone and the chip in the PC, which can be radio frequency for example. If the consumer has coupons in their mobile wallet the consumer can either elect to manually apply the coupon, save the coupon for a future use (against a larger purchase for example), or have the coupon automatically applied during the transaction and the transaction amount is updated. After the consumer enters any necessary validation information (e.g., pin) to provide a multi-factor authentication and confirms the transaction, the online purchase is processed as normal by the merchant's online processor. The mobile wallet can retrieve transaction data, account balance from the management server 408.


In one implementation, the mobile communication device 102 is a non NFC-enabled phone. In this implementation, the consumer connects his phone to the PC 404 via some non radio frequency method (e.g., IR, Bluetooth, USB cable, etc.). When a consumer is shopping online and they are ready to pay for their products, the consumer opens his mobile wallet and selects one of the payment methods (e.g., credit card, debit card, prepaid card, etc.) from their mobile wallet. If a default card has been selected already, this step is not necessary. The consumer then pushes, e.g., a “Buy now” button and the consumer's payment credentials are transferred from the phone to the merchant website (e.g., online store application 410) using the protocol between the phone and the PC 404 which can be radio frequency, for example. If the consumer has coupons in their mobile wallet the consumer can either elect to manually apply the coupon, save the coupon for a future use, or have the coupon automatically applied during the transaction and the transaction amount is updated. After the consumer enters any necessary validation information (e.g., pin) to provide multi-factor authentication and confirms the transaction, the online purchase is processed as normal by the merchant's online processor. The mobile wallet can retrieve transaction data and account balance from the management server 408.


In one implementation, the management server 408 and merchant portal (e.g., online store 408) are maintained by trusted parties and use an encrypted tunnel to transfer financial data. When the consumer is ready to pay for their online product, they enter their cell phone number on the merchant portal. The merchant portal (which has an MCD applet (e.g., MCD POS plugin 414) installed on its server) securely connects to the management server 408 (that in one implemetation is maintained by Mobile Candy Dish (MCD)). In one implementation, the management server 408 identifies the consumer through their cell phone number, and verifies the consumer's authenticity by sending a unique transaction code to the consumer mobile wallet on their cell phone. The consumer then enters this unique transaction code onto the merchant's web portal. The merchant portal sends this transaction number to the management server 408 for authentication. Upon authentication, the consumer's virtual wallet and payment methods (e.g., credit card, debit card, prepaid card, etc.) are securely retrieved from the management server 408 and are displayed to the consumer in a window on a website associated with the merchant portal. The consumer selects one of these payment methods to pay for their transaction. If a default card has been selected already, this step is not necessary. If the consumer has coupons in their mobile wallet the consumer can either elect to manually apply the coupon, save the coupon for a future use, or have the coupon automatically applied during the transaction and the transaction amount is updated. After the consumer enters any necessary validation information to provide a multi-factor authentication and confirms the transaction, the online purchase is processed as normal by the merchant's online processor. The mobile wallet can retrieve transaction data, account balance from the management server 408.


Referring to FIG. 2, in one implementation, the mobile application 200 maintains a shopping list 202 for a consumer. Accordingly, consumers have the ability to store their shopping list in their mobile wallet and add, delete, or change items on their shopping list either in offline or online mode. In one implementation, consumers are sent coupons based on items on their shopping list, preferences, previous shopping history, proximity to the physical retail store, or a combination of these parameters, as discussed in application Ser. No. 11/944,267, which is incorporated by reference above. If the consumer has coupons in their mobile wallet the consumer can either elect to manually apply the coupon, save the coupon for a future use, or have the coupon automatically applied during the transaction and the transaction amount is updated. When a consumer wants to order the items on their shopping list via an on online merchant (in contrast to a physical retail store), the consumer can logon to the merchant portal and electronically transmit their shopping list to the merchant portal either by waving their phone over NFC enabled PC's or some other connection such as IR, bluetooth, USB, or the like.



FIG. 3 illustrates a method 300 for conducting a payment transaction using a point of sale device (e.g., point of sale device 104). User input is received selecting one or more items for purchase (e.g., at the point of sale device) (step 302). In general, the transaction being made at the point of sale device can be any type of transaction that involves the exchange or transfer of funds—e.g., the transaction can be a payment transaction, a fund transfer, or other type of transaction. In response to a request from the user to purchase the one or more items, a total purchase amount for the one or more items is calculated (e.g., by the point of sale device) (step 304). If the user has coupons in their mobile wallet the user can either manually apply the coupon or have the coupon automatically applied during the transaction and the transaction amount is updated. The user request to purchase an item can be received, e.g., by a user clicking on a “buy now” icon that is displayed on a graphical user interface of the point of sale device. Payment authorization for the total purchase amount is sent to a payment entity through a mobile communication device of the user (step 306). A result of the payment authorization is received at the point of sale device from the payment entity via the mobile communication device (step 308). The payment transaction is completed based on the result of the payment authorization (step 310). If the payment transaction was authorized by the payment entity, then the sale of the items through the point of sale device is completed. Otherwise, if the payment transaction was not authorized by the payment entity, then the point of sale device terminates the payment transaction.



FIG. 4 illustrates an example payment transaction being made in a communication system 400 in accordance with one implementation. The communication system 400 includes a mobile communication device 402, a personal computer (PC) 404, an online store 406, and a core (or datastore) 408. As indicated by interaction (1), a user (or customer), using a phone (e.g., mobile communication device 402 or personal computer 404), browses an online store website (online store application 410) and finds an item that the customer wishes to purchase. This could also be a purchase made through a midlet application (PUS midlet 412) residing on the mobile communication device 402. The user then goes to, e.g., a checkout of the online store 406 make a purchase. If the user has coupons in their mobile wallet the user can either manually apply the coupon or have the coupon automatically applied during the transaction and the transaction amount is updated. When it comes time to authorize the purchase, (in one implementation) the user is given an option to purchase with the mobile communication device 402. In one implementation, the mobile communication device 402 is an NFC-equipped phone (or NFC phone).


In interaction (2), when the user chooses to purchase with the mobile communication device 402, the online store application 410 sends the transaction information for authorization to the PUS vendor plugin (e.g., MCD PUS plugin 414). In one implementation, the PUS vendor plugin is installed in the merchant's online store and enables the merchant to accepts MCD Blaze payments as an alternative form of payment, similar to accepting credit cards for payment. As shown by interaction (3), the PUS vendor plugin formats, encrypts, and cryptographically signs the purchase authorization request which is sent via a secure SSL link (e.g., HTTPS, Bluetooth, IR, USB, or other suitable protocol) established by the browser/web application 416 back to the mobile communication device 402. As with the first scenario, all communications is over secure channels. (It may be required that the mobile wallet application be opened prior to beginning a phone online purchase.) The PUS midlet 412 is a component of the mobile wallet application that executes PayPass or other payment authorization protocol between. itself and the SE payment applications on the mobile communication device 402 (interaction (4)). The results of the request are sent back to the PUS vendor plugin.


As shown by interaction (5), the POS midlet 412 then forwards the properly formatted authorization request to a payment entity (e.g., issuer authorization 418) for authorization. The results of the request are then sent back to the PUS component of the mobile wallet. Through interaction (6), the PUS midlet 412 then forwards the results back to the MCD POS plugin 414 to complete the purchase. The MCD PUS plugin 414 then forwards the purchase transaction information to the management server 408 for later customer viewing (interaction (7)). As indicated by interaction (8), users (or customers) will then be able to query the management server 408 and immediately obtain purchase information, either by phone or PC.


One or more of method steps described above can be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Generally, the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In one implementation, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc. Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.



FIG. 5 illustrates a data processing system 500 suitable for storing and/or executing program code. Data processing system 500 includes a processor 502 coupled to memory elements 504A-B through a system bus 506. In other implementations, data processing system 500 may include more than one processor and each processor may be coupled directly or indirectly to one or more memory elements through a system bus. Memory elements 504A-B can include local memory employed during actual execution of the program code, bulk storage, and cache memories that provide temporary storage of at least some program code in order to reduce the number of times the code must be retrieved from bulk storage during execution. As shown, input/output or I/O devices 508A-B (including, but not limited to, keyboards, displays, pointing devices, etc.) are coupled to data processing system 500. I/O devices 508A-B may be coupled to data processing system 500 directly or indirectly through intervening I/O controllers (not shown).


In one implementation, a network adapter 510 is coupled to data processing system 500 to enable data processing system 500 to become coupled to other data processing systems or remote printers or storage devices through communication link 512. Communication link 512 can be a private or public network. Modems, cable modems, and Ethernet cards are just a few of the currently available types of network adapters.


Although the present invention has been particularly described with reference to implementations discussed above, various changes, modifications and substitutes are can be made. Accordingly, it will be appreciated that in numerous instances some features of the invention can be employed without a corresponding use of other features. Further, variations can be made in the number and arrangement of components illustrated in the figures discussed above.

Claims
  • 1. A method for determining a payment method used in a Near Field Communication (NFC) transaction using an NFC protocol, the method comprising: receiving, at a remote management server, an identification code associated with a user via a first communication channel from an NFC terminal,wherein the identification code associated with the user is transmitted from a secure element memory to the NFC terminal via an NFC transceiver configured to use the NFC protocol through a second communication channel, while a secure element application configured to use the NFC protocol is being executed by an NFC processor configured to use the NFC protocol in response to a detection of a near field communication inductive signal from the NFC terminal,wherein the secure element memory maintains the identification code associated with the user and the secure element application,wherein the secure element memory, the NFC transceiver, and the NFC processor are all included in a secure element permanently embedded in a mobile device,the mobile device comprising a mobile device memory which maintains a non-browser based application, a mobile device display, a mobile device processor, and a mobile device wireless transceiver that supports voice and data interactions using a third communication channel; wherein the non-browser based application is a mobile operating system platform based application with a graphical user interface that is preinstalled or downloaded and installed on the mobile device, wherein the graphical user interface includes a graphical icon; andidentifying, at the remote management server, a payment method that corresponds to the identification code associated with the user, wherein the payment method is maintained at the remote management server.
  • 2. The method of claim 1, further wherein after the NFC transaction has been processed using the payment method that corresponds to the identification code associated with the user, receiving, at the mobile device, a digital artifact for display in the graphical user interface of the non-browser based application.
  • 3. The method of claim 2, further wherein the digital artifact comprises an advertisement, receipt, ticket, coupon, media, metadata, and/or content.
  • 4. The method of claim 1, wherein the payment method is information related to a credit card number, information related to a debit card number, or information related to a prepaid card number.
  • 5. The method of claim 1, wherein no sensitive information is stored on the mobile device.
  • 6. The method of claim 5, wherein the sensitive information comprises at least one of information related to the payment method or information related to an expiration date associated with the payment method.
  • 7. The method of claim 1, further wherein the non-browser based application is operative when the mobile device is not connected to a wireless network.
  • 8. The method of claim 2, further wherein the non-browser based application sends a request to the remote management server for retransmission of the digital artifact if it has not received the digital artifact from the remote management server within a certain period of time.
  • 9. The method of claim 2, further wherein, the non-browser based application displays the digital artifact while the mobile device maintains a connection to a wireless network; and further comprises:losing the connection of the mobile device to the wireless network while the non-browser based application displays the digital artifact; andin an offline mode, after losing the connection, continuing to display the digital artifact within the non-browser based application.
  • 10. The method of claim 2, further wherein, the digital artifact is based on the remote management server correlating the identification code associated with the user, information related to the payment method, information related to the user, information related to the NFC transaction, and information related to a transaction history of the user.
  • 11. A remote management server for determining a payment method used in a Near Field Communication (NFC) transaction using an NFC protocol comprising: a remote management server receiver that receives an identification code associated with a user via a first communication channel from an NFC terminal configured to use the NFC protocol,wherein the identification code associated with the user is transmitted to the NFC terminal configured to use the NFC protocol through a second communication channel via an NFC transceiver configured to use the NFC protocol when a secure element application configured to use the NFC protocol is being executed by an NFC processor configured to use the NFC protocol in response to a detection of a near field communication inductive signal from the NFC terminal,wherein the secure element memory maintains the identification code associated with the user and the secure element application, wherein the secure element memory the NFC processor, and the NFC transceiver are included in a secure element permanently embedded in a mobile device,the mobile device comprising a mobile device memory that stores a non-browser based application, a mobile device display, a mobile device processor, a mobile device wireless transceiver that supports voice and data interactions using a third communication channel, wherein the non-browser based application is a mobile operating system platform based application with a graphical user interface that is preinstalled or downloaded and installed on the mobile device, wherein the graphical user interface includes a graphical icon;a remote management server processer that identifies a payment method that corresponds to the identification code associated with the user, wherein the payment method is maintained at the remote management server.
  • 12. The remote management server of claim 11, further wherein after the NFC transaction has been processed using the payment method that corresponds to the identification code associated with the user, receiving, at the mobile device, a digital artifact for display in the graphical user interface of the non-browser based application.
  • 13. The remote management server of claim 12, further wherein the digital artifact comprises an advertisement, receipt, ticket, coupon, media, metadata, and/or content.
  • 14. The remote management server of claim 11, wherein the payment method is information related to a credit card number, information related to a debit card number, or information related to a prepaid card number.
  • 15. The remote management server of claim 11, wherein no sensitive information is stored on the mobile device.
  • 16. The remote management server of claim 15, wherein the sensitive information comprises at least one of information related to the payment method or information related to an expiration date associated with the payment method.
  • 17. The remote management server of claim 11, further wherein the non-browser based application is operative when the mobile device is not connected to a wireless network.
  • 18. The remote management server of claim 12, further wherein the non-browser based application sends a request to the remote management server for retransmission of the digital artifact if it has not received the digital artifact from the remote management server within a certain period of time.
  • 19. The remote management server of claim 12, further wherein, the non-browser based application displays the digital artifact while the mobile device maintains a connection to a wireless network; and further comprises:losing the connection of the mobile device to the wireless network while the non-browser based application displays the digital artifact; andin an offline mode, after losing the connection, continuing to display the digital artifact within the non-browser based application.
  • 20. The remote management server of claim 12, further wherein, the remote management server bases the digital artifact on correlating the identification code associated with the user, information related to the payment method, information related to the user, information related to the NFC transaction, and information related to a transaction history of the user.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of application Ser. No. 14/253,648, filed Apr. 15, 2014 titled “REMOTE TRANSACTION PROCESSING OF AT A TRANSACTION SERVER” which is a continuation and claims priority to application Ser. No. 13/736,056, filed Jan. 7, 2013, titled “REMOTE TRANSACTION PROCESSING USING A DEFAULT PAYMENT METHOD” now U.S. Pat. No. 8,694,380 issued on Apr. 8, 2014 which is a continuation and claims priority to application Ser. No. 11/948,903, filed Nov. 30, 2007, titled “METHOD AND SYSTEM FOR CONDUCTING AN ONLINE PAYMENT TRANSACTION USING A MOBILE COMMUNICATION DEVICE”, now U.S. Pat. No. 8,352,323 issued on Jan. 8, 2013 all of which are incorporated by reference herein in their entirety.

US Referenced Citations (230)
Number Name Date Kind
6038367 Abecassis Mar 2000 A
6101483 Petrovich Aug 2000 A
6115601 Ferreira Sep 2000 A
6123259 Ogasawara Sep 2000 A
6128655 Fields Oct 2000 A
6141666 Tobin Oct 2000 A
6199082 Ferrel Mar 2001 B1
6250557 Forslund Jun 2001 B1
6415156 Stadelmann Jul 2002 B1
6450407 Freeman Sep 2002 B1
6587835 Treyz Jul 2003 B1
6605120 Fields Aug 2003 B1
6771981 Zalewski Aug 2004 B1
6772396 Cronin Aug 2004 B1
6886017 Jackson Apr 2005 B1
6950939 Tobin Sep 2005 B2
7014107 Singer Mar 2006 B2
7031945 Donner Apr 2006 B1
7059531 Beenau Jun 2006 B2
7069248 Huber Jun 2006 B2
7096003 Joao Aug 2006 B2
7110744 Freeny Sep 2006 B2
7110792 Rosenberg Sep 2006 B2
7127236 Khan Oct 2006 B2
7200578 Paltenghe Apr 2007 B2
7239226 Berardi Jul 2007 B2
7289810 Jagadeesan Oct 2007 B2
7308254 Rissanen Dec 2007 B1
7357312 Gangi Apr 2008 B2
7376583 Rolf May 2008 B1
7379920 Leung May 2008 B2
7472829 Brown Jan 2009 B2
7482925 Hammad Jan 2009 B2
7493284 Celi et al. Feb 2009 B2
7512567 Bemmel Mar 2009 B2
7522905 Hammad Apr 2009 B2
7717334 Rolf May 2010 B1
7739596 Clarke-Martin Jun 2010 B2
7783532 Hsu Aug 2010 B2
7784684 Labrou Aug 2010 B2
7818284 Walker Oct 2010 B1
7827056 Walker Nov 2010 B2
7870077 Woo Jan 2011 B2
7979519 Shigeta Jul 2011 B2
8005426 Huomo Aug 2011 B2
8019362 Sweatman Sep 2011 B2
8073424 Sun Dec 2011 B2
8086534 Powell Dec 2011 B2
8109444 Jain Feb 2012 B2
8121945 Rackley Feb 2012 B2
8127984 Zatloukal Mar 2012 B2
8214454 Barnes Jul 2012 B1
8412623 Moon Apr 2013 B2
8566239 Arthur Oct 2013 B2
8693995 Fisher Apr 2014 B2
8700729 Dua Apr 2014 B2
9294917 Nystrom Mar 2016 B2
9646294 Fisher May 2017 B2
9684892 Fisher Jun 2017 B2
9836731 Fisher Dec 2017 B2
9996849 Fisher Jun 2018 B2
10339556 Fisher Jul 2019 B2
10621612 Fisher Apr 2020 B2
10825007 Fisher Nov 2020 B2
20010011250 Paltenghe Aug 2001 A1
20010044751 Pugliese, III Nov 2001 A1
20020056091 Bala May 2002 A1
20020059100 Shore May 2002 A1
20020063895 Agata May 2002 A1
20020065774 Young May 2002 A1
20020077918 Lerner Jun 2002 A1
20020082879 Miller Jun 2002 A1
20020107756 Hammons Aug 2002 A1
20020116269 Ishida Aug 2002 A1
20020160761 Wolfe Oct 2002 A1
20020169664 Walker Nov 2002 A1
20020169984 Kumar Nov 2002 A1
20030061113 Petrovich Mar 2003 A1
20030065805 Barnes Apr 2003 A1
20030066883 Yu Apr 2003 A1
20030074259 Slyman, Jr. Apr 2003 A1
20030085286 Kelley May 2003 A1
20030087601 Agam May 2003 A1
20030093695 Dutta May 2003 A1
20030105641 Lewis Jun 2003 A1
20030132298 Swartz Jul 2003 A1
20030140004 O'Leary Jul 2003 A1
20030149662 Shore Aug 2003 A1
20030163359 Kanesaka Aug 2003 A1
20030172028 Abell Sep 2003 A1
20040006497 Nestor Jan 2004 A1
20040030658 Cruz Feb 2004 A1
20040034544 Fields Feb 2004 A1
20040064408 Kight Apr 2004 A1
20040064410 Kight Apr 2004 A1
20040073497 Hayes Apr 2004 A1
20040093271 Walker May 2004 A1
20040111320 Schlieffers Jun 2004 A1
20040127256 Goldthwaite Jul 2004 A1
20040235450 Rosenberg Nov 2004 A1
20040243519 Perttila Dec 2004 A1
20040254836 Emoke Barabas Dec 2004 A1
20040267618 Judicibus Dec 2004 A1
20040267665 Nam Dec 2004 A1
20050003810 Chu Jan 2005 A1
20050040230 Swartz Feb 2005 A1
20050043994 Walker Feb 2005 A1
20050076210 Thomas Apr 2005 A1
20050165646 Tedesco Jul 2005 A1
20050187873 Labrou Aug 2005 A1
20050190970 Griffin Sep 2005 A1
20050215231 Bauchot Sep 2005 A1
20060000900 Fernandes Jan 2006 A1
20060031752 Surloff Feb 2006 A1
20060049258 Piikivi Mar 2006 A1
20060065741 Vayssiere Mar 2006 A1
20060089874 Newman Apr 2006 A1
20060143091 Yuan Jun 2006 A1
20060165060 Dua Jul 2006 A1
20060191995 Stewart Aug 2006 A1
20060206709 Labrou Sep 2006 A1
20060219780 Swartz Oct 2006 A1
20060242267 Grossman Oct 2006 A1
20060287004 Fuqua Dec 2006 A1
20060287920 Perkins Dec 2006 A1
20060294025 Mengerink Dec 2006 A1
20070004391 Maffeis Jan 2007 A1
20070011099 Sheehan Jan 2007 A1
20070012763 Van de Velde Jan 2007 A1
20070021969 Homeier-Beals Jan 2007 A1
20070022058 Labrou Jan 2007 A1
20070052517 Bishop Mar 2007 A1
20070075133 Yeager Apr 2007 A1
20070095892 Lyons May 2007 A1
20070015060 Angelica Jun 2007 A1
20070125838 Law Jun 2007 A1
20070125840 Law Jun 2007 A1
20070131759 Cox Jun 2007 A1
20070138299 Mitra Jun 2007 A1
20070145135 Jogand-Coulomb Jun 2007 A1
20070156436 Fisher Jul 2007 A1
20070179883 Questembert Aug 2007 A1
20070194110 Esplin Aug 2007 A1
20070198334 Mebruer Aug 2007 A1
20070210155 Swartz Sep 2007 A1
20070235519 Jang Oct 2007 A1
20070235539 Sevanto Oct 2007 A1
20070255662 Tumminaro Nov 2007 A1
20070262139 Fiebiger Nov 2007 A1
20070266130 Mazur Nov 2007 A1
20070270166 Hampel Nov 2007 A1
20070293155 Liao Dec 2007 A1
20080004952 Koli Jan 2008 A1
20080006685 Rackley, III Jan 2008 A1
20080010190 Rackley, III Jan 2008 A1
20080010191 Rackley, III Jan 2008 A1
20080010192 Rackley, III Jan 2008 A1
20080010193 Rackley, III Jan 2008 A1
20080010196 Rackley, III Jan 2008 A1
20080010204 Rackley, III Jan 2008 A1
20080010215 Rackley, III Jan 2008 A1
20080017703 Lu Jan 2008 A1
20080017704 VanDeburg Jan 2008 A1
20080027795 Medlin Jan 2008 A1
20080294556 Anderson Jan 2008 A1
20080040265 Rackley, III Feb 2008 A1
20080045172 Narayanaswami Feb 2008 A1
20080046366 Bemmel Feb 2008 A1
20080048022 Vawter Feb 2008 A1
20080051059 Fisher Feb 2008 A1
20080051142 Calvet Feb 2008 A1
20080052192 Fisher Feb 2008 A1
20080052233 Fisher Feb 2008 A1
20080059329 Luchene Mar 2008 A1
20080104098 Li May 2008 A1
20080116264 Hammad et al. May 2008 A1
20080126145 Rackley, III May 2008 A1
20080126260 Cox May 2008 A1
20080133336 Altman Jun 2008 A1
20080139155 Boireau Jun 2008 A1
20080140520 Hyder Jun 2008 A1
20080148040 Machani Jun 2008 A1
20080162312 Sklovsky Jul 2008 A1
20080167961 Wentker Jul 2008 A1
20080167988 Sun Jul 2008 A1
20080172274 Hurowitz Jul 2008 A1
20080172285 Hurowitz Jul 2008 A1
20080172291 Hurowitz Jul 2008 A1
20080172292 Hurowitz Jul 2008 A1
20080177668 Delean Jul 2008 A1
20080207234 Arthur Aug 2008 A1
20080208681 Hammad Aug 2008 A1
20080208743 Arthur Aug 2008 A1
20080208744 Arthur Aug 2008 A1
20080208762 Arthur Aug 2008 A1
20080221997 Wolfe Sep 2008 A1
20080227391 Rosenberg Sep 2008 A1
20080249938 Drake-Stoker Oct 2008 A1
20080255947 Friedman Oct 2008 A1
20080262928 Michaelis Oct 2008 A1
20080274794 Mathieson Nov 2008 A1
20080275779 Lakshminarayanan Nov 2008 A1
20080305774 Ramakrishna Dec 2008 A1
20090000618 Hameen-Anttila Jan 2009 A1
20090018913 Sarukkai Jan 2009 A1
20090061884 Rajan Mar 2009 A1
20090063312 Hurst Mar 2009 A1
20090075592 Nystrom et al. Mar 2009 A1
20090076912 Rajan Mar 2009 A1
20090098825 Huomo Apr 2009 A1
20090104888 Cox Apr 2009 A1
20090106112 Dalmia Apr 2009 A1
20090112747 Mullen Apr 2009 A1
20090124234 Fisher May 2009 A1
20090132362 Fisher May 2009 A1
20090143104 Loh Jun 2009 A1
20090144161 Fisher Jun 2009 A1
20090177587 Siegal Jul 2009 A1
20090227281 Hammad Sep 2009 A1
20100057619 Weller Mar 2010 A1
20100063895 Dominguez Mar 2010 A1
20100145835 Davis Jun 2010 A1
20100252624 Van de Velde Oct 2010 A1
20100312694 Homeier-Beals Dec 2010 A1
20110212751 Havens Sep 2011 A1
20110320316 Randazza Dec 2011 A1
20120150744 Carlson Jun 2012 A1
20120215573 Sussman Aug 2012 A1
20130054470 Campos Feb 2013 A1
20150012440 Kelley Jan 2015 A1
Foreign Referenced Citations (4)
Number Date Country
1503352 Feb 2005 EP
WO 2006095212 Sep 2006 WO
WO 2006095212 Sep 2006 WO
WO 2007129081 Nov 2007 WO
Non-Patent Literature Citations (31)
Entry
U.S. Appl. No. 16/389,925, Notice of Allowance dated Dec. 31, 2019, 8 p.
U.S. Appl. No. 15/175,150, Notice of Allowance dated Apr. 5, 2017, 5 p.
U.S. Appl. No. 11/933,367, Office Action dated May 27, 2010, 8 p.
U.S. Appl. No. 14/686,695, Notice of Allowance dated Oct. 12, 2017, 11 p.
1739369(MasterCard PayPass.pdf athttps://www.google.co.kr/search?q=MasterCard.+PayPass+Mag+Stripe%2C+Acquirer+Implementation+Requirernents&newwindow=1&biw=1851&bih=973&source=lnt&tbs=cdr%3A1%2Ccd_min%3A%2Ccd_max%3A8%2F24%2F2006&tbm=#newwindow=1&tbs=cdr:1,cd_max:8/24/2006&q=MasterCard%C2%AEPayPass%E2%84%A2+mag+stripe,+acquirer+Implementation+requirements&spf=1495411706977.
“Is near-field communication close to success?” article dated Mar. 2006 at http://ieeexplore.ieee.org/document/1607943/.
IPR2021-01569.
U.S. Appl. No. 12/592,581, Board of Appeal Decision dated Oct. 30, 2020, 19 p.
U.S. Appl. No. 12/592,581 (now '399 patent), Notice of Allowance dated Dec. 9, 2020, 8 p.
1739369(MasterCard PayPass.pdf https://www.securetechalliance.org/resources/lib/contactless_pmt_benefits_report.pdf.
“Is near-field communication close to success?” http://ieeexplore.ieee.org/document/1607943/.
“Room6_150pm_munro.pdf” at http://www.rfidjournal.net/live05/monday/.
Wikipedia Infrared https://en.wikipedia.org/wiki/Infrared_Data_Association.
Wikiepedia Bluetooth http://nearfieldcommunication.org/bluetooth.html.
Wikipedia NFC https://en.wikipedia.org/wiki/Near-field_communication.
RF wireless comparison of NFC vs RFID http://www.rfwireless-world.com/Terminology/NFC-vs-RFID-vs-Bluetooth-vs-wifi.html.
Near Field Communication—Interface and Protocol (NFCIP-1). ISO/IEC, 2004.
Server Microsoft Press Computer Dictionary, 2nd Edition.
ISO/IEC 7813 and Track 1 https://en.wikipedia.org/wiki/ISO/IEC_7813.
Payment Card Number https://en.wikipedia.org/wiki/Payment_card_number.
IPR2021-01560.
IPR2021-01570.
IPR2021-01571.
Denial of Institution of IPR 2021-01560 dated Mar. 22, 2022.
Denial of Institution of IPR2021-01570 dated Apr. 12, 2022.
Denial of Institution of IPR2021-01571 dated Apr. 2, 2022.
Denial of rehearing request for IPR 2021-01560 dated Jul. 14, 2022.
Denial of rehearing request for IPR 2021-01570 dated Jun. 29, 2022.
Denial of rehearing request for IPR 2021-01571 dated Jun. 9, 2022.
Re-Exam U.S. Appl. No. 90/019,198.
Re-Exam U.S. Appl. No. 90/019,154.
Related Publications (1)
Number Date Country
20210081915 A1 Mar 2021 US
Continuations (3)
Number Date Country
Parent 14253648 Apr 2014 US
Child 17084530 US
Parent 13736056 Jan 2013 US
Child 14253648 US
Parent 11948903 Nov 2007 US
Child 13736056 US